INFORMATION TECHNOLOGY AT THE NATIONAL COMPUTING CENTER

被引:0
|
作者
PRITCHARD, JA
机构
[1] Natl Computing Cent Ltd, Oxford, Engl, Natl Computing Cent Ltd, Oxford, Engl
关键词
D O I
10.1016/0140-3664(86)90054-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
4
引用
收藏
页码:303 / 316
页数:14
相关论文
共 50 条
  • [21] NATIONAL REFERRAL CENTER FOR SCIENCE AND TECHNOLOGY
    STEARNS, JF
    SPECIAL LIBRARIES, 1963, 54 (01) : 45 - 46
  • [22] THE ROLE OF A NATIONAL INFORMATION-CENTER
    EBEL, G
    COMPUTER PHYSICS COMMUNICATIONS, 1984, 33 (1-3) : 211 - 215
  • [23] The National Rehabilitation Information Center (NARIC)
    Antunez, Marilia Y.
    JOURNAL OF THE MEDICAL LIBRARY ASSOCIATION, 2022, 110 (03) : 388 - 391
  • [24] THE NATIONAL POISON INFORMATION-CENTER
    PIKAAR, SA
    VANHEIJST, ANP
    VETERINARY AND HUMAN TOXICOLOGY, 1979, 21 : 76 - 80
  • [25] THE NATIONAL-CENTER-FOR-BIOTECHNOLOGY-INFORMATION
    BENSON, D
    BOGUSKI, M
    LIPMAN, DJ
    OSTELL, J
    GENOMICS, 1990, 6 (02) : 389 - 391
  • [26] Evaluating Healthcare Information Technology Outside of Academia: Observations from the National Resource Center for Healthcare Information Technology at the Agency for Healthcare Research and Quality
    Poon, Eric G.
    Cusack, Caitlin M.
    McGowan, Julie J.
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2009, 16 (05) : 631 - 636
  • [27] FORESTRY-TECHNOLOGY-INFORMATION-CENTER
    LEINERT, S
    LANDTECHNIK, 1978, 33 (05): : 231 - 232
  • [28] Information Technology Education Based on Cloud Computing
    Zheng, Jiangyan
    Cao, Shijie
    Zheng, Jianhui
    Chen, Zhihui
    Hong, Liang
    INFORMATION COMPUTING AND APPLICATIONS, ICICA 2013, PT I, 2013, 391 : 417 - +
  • [29] The Privacy Research Community in Computing and Information Technology
    Perez, Charles
    Sokolova, Karina
    NINTH INTERNATIONAL CONFERENCES ON PERVASIVE PATTERNS AND APPLICATIONS (PATTERNS 2017), 2017, : 127 - 133
  • [30] Fog computing: Survey on decoy information technology
    Almobaideen W.
    Altarawneh M.
    International Journal of Security and Networks, 2020, 15 (02) : 111 - 121